PodcastsNachrichtenSecurity Weekly Podcast Network (Audio)

Security Weekly Podcast Network (Audio)

Security Weekly Productions
Security Weekly Podcast Network (Audio)
Neueste Episode

3341 Episoden

  • Security Weekly Podcast Network (Audio)

    Breaking in with CrashFix, supply chain security, and CMMC phase 1 - David Zendzian, Anna Pham, Jacob Horne - ESW #449

    09.03.2026 | 1 Std. 34 Min.
    Interview with Anna Pham
    Breaking in with ClickFix: Anatomy of a modern endpoint attack
    Cybersecurity company Huntress just published a report on a new ClickFix variant they’ve discovered, which they’ve dubbed CrashFix. This technique was developed by KongTuke to serve as the primary lure within a new custom malicious browser extension also created by the group.
    In short, the team observed the threat actors using KongTuke’s malicious browser extension to display a fake security warning, claiming the browser had “stopped abnormally” and prompting users to run a “scan” to remediate the threats. Upon “running the scan,” the user is presented with a fake “Security issues detected” alert and instructed to manually “fix” the issue by opening the Windows Run dialog, pasting from their clipboard, and pressing Enter.
    The malicious extension silently copies a PowerShell command to the clipboard, disguised as a legitimate repair command. From there, they execute the malicious command.
    Segment Resources:
    BLOG - Dissecting CrashFix: KongTuke's New Toy
    Interview with David Zendzian
    Continuous compliance and real security lifecycle management
    Supply chain attacks are not just on the rise; attackers are learning from the past, making these attacks even more effective and dangerous than before. It was just over a month ago when the Shai-Hulud attack first impacted NPM packages, forcing enterprises around the world into lockdown. While only 187 packages were compromised in that initial incident, it served as a wake-up call for many: an accurate inventory of systems is good, but a clear, real-time Software Bill of Materials (SBOM) for applications is non-negotiable.
    In this world of manifest based infrastructure and container based applications with (real) "devsecops", the dream of continuous upgrades of OS/Runtime/Stack/App and App Dependencies is very mature and there are solid examples of companies and federal entities managing this at scale without thousands of teams and people.
    Segment Resources:
    BLOG - Supply Chain Security: How accurate SBOMs can deliver proactive threat mitigation
    Interview with Jacob Horne
    CMMC Phase 1 Enforcement — What the November 10 Deadline Means for the Defense Supply Chain
    With the upcoming CMMC Phase 1 enforcement on November 10, cybersecurity teams across the defense and federal supply chain are facing new compliance requirements that directly affect contract eligibility and data-protection standards. Jacob Horne, Chief Cybersecurity Evangelist at Summit 7, can break down what this milestone means for enterprise security leaders, MSPs/MSSPs, and contractors preparing for audits.
    Visit https://www.securityweekly.com/esw for all the latest episodes!
    Show Notes: https://securityweekly.com/esw-449
  • Security Weekly Podcast Network (Audio)

    Iran vs Everyone: 2FA-Bypass Phish, APT41 Drive, iOS 0days, Josh Marpet, and More - SWN #561

    06.03.2026 | 36 Min.
    Iran vs Everyone: 2FA-Bypass Phish, APT41 Drive, iOS 0days, Josh Marpet, and More on the Security Weekly News
    Visit https://www.securityweekly.com/swn for all the latest episodes!
    Show Notes: https://securityweekly.com/swn-561
  • Security Weekly Podcast Network (Audio)

    Airsnitch, Claude, Hacking Firewalls - PSW #916

    05.03.2026 | 2 Std. 3 Min.
    In the security news this week:
    Remembering "FX"
    Finding and analyzing Windows drivers
    Network monitoring with Gibson
    the backdoor in your PAM
    The edge is fraying - and attackers have the advantage
    Age verification for Linux?
    Banning AI
    TPMS tracking
    BLE tracking
    weird strings
    Airsnitch
    RESURGE in and on Ivanti
    Attackers using Claude
    Government iPhone hacking kits
    Cisco SD-WAN, Linux, and 2023
    Leakbase leaks
    and Bro, upgrade your solar panel!
    Visit https://www.securityweekly.com/psw for all the latest episodes!
    Show Notes: https://securityweekly.com/psw-916
  • Security Weekly Podcast Network (Audio)

    Building Trusted Automation as Leaders Struggle with AI Adoption and CISOs Hire - Tim Morris - BSW #437

    04.03.2026 | 1 Std. 7 Min.
    With the introduction of Agentic AI, autonomous "everything" is all the rage. But we've been burned by automation in the past. Remember the days of Intrusion Prevention Systems and why we never put them into blocking mode? Automation may be the future of security and IT operations, but the path to autonomous "everything" must be earned. How do you build autonomous capabilities with confidence and trust?
    Tim Morris, Financial Services Strategist at Tanium, joins Business Security Weekly to discuss how teams can introduce autonomous capabilities in a crawl-walk-run progression that builds trust over time. Automation is not about laying off employees, it's about efficiency and speed. Tim will guide us on a journey to build automation we can trust that allow us to reduce repetitive work and minimize human error without creating fear of “machine mistakes.”
    This segment is sponsored by Tanium. Visit https://securityweekly.com/tanium to learn more about them!
    In the leadership and communications segment, Boards don’t need cyber metrics — they need risk signals, Why Cybersecurity Is Now a Business Strategy, Not Just IT?, Where Senior Leaders Are Struggling with AI Adoption, According to Research, and more!
    Visit https://www.securityweekly.com/bsw for all the latest episodes!
    Show Notes: https://securityweekly.com/bsw-437
  • Security Weekly Podcast Network (Audio)

    North Korea, DOJ, APT 28, Anthropic, OpenClaw, Supply Chain, Josh Marpet, and More - SWN #560

    03.03.2026 | 32 Min.
    North Korea, DOJ, APT 28, Anthropic, OpenClaw, Supply Chain, Josh Marpet, and More on Security Weekly News
    Visit https://www.securityweekly.com/swn for all the latest episodes!
    Show Notes: https://securityweekly.com/swn-560

Weitere Nachrichten Podcasts

Über Security Weekly Podcast Network (Audio)

Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and breaking news on the latest hacking techniques, vulnerabilities, and industry trends. Stay informed and secure with the most trusted voices in cybersecurity!
Podcast-Website

Höre Security Weekly Podcast Network (Audio), Was jetzt? und viele andere Podcasts aus aller Welt mit der radio.de-App

Hol dir die kostenlose radio.de App

  • Sender und Podcasts favorisieren
  • Streamen via Wifi oder Bluetooth
  • Unterstützt Carplay & Android Auto
  • viele weitere App Funktionen

Security Weekly Podcast Network (Audio): Zugehörige Podcasts

Rechtliches
Social
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/9/2026 - 9:37:10 PM